[Bug tree-optimization/104964] Wrong *** buffer overflow detected ***: terminated - acl
siddhesh at gcc dot gnu.org
gcc-bugzilla@gcc.gnu.org
Mon Mar 28 06:33:02 GMT 2022
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=104964
Siddhesh Poyarekar <siddhesh at gcc dot gnu.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|ASSIGNED |RESOLVED
Resolution|--- |WONTFIX
--- Comment #15 from Siddhesh Poyarekar <siddhesh at gcc dot gnu.org> ---
(In reply to Jakub Jelinek from comment #14)
> Thus I'd say fix up acl instead.
OK, closing this as WONTFIX then. __bos/__bdos has limited support for zero
sized arrays; they are not recognized as flex arrays when in nested structs.
Fixing up the struct to one with a proper flex array (i.e. without a dimension
size, which also will need another member preceding it) should make this work
correctly. Something like:
struct __string_ext
{
char pad;
char s_str[];
};
More information about the Gcc-bugs
mailing list